Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe
-
Size
128KB
-
MD5
d1ec1a2135ea41191ac64a82bc847879
-
SHA1
8dfff51bb4e3f9f6b3904bed604406d3e73237d2
-
SHA256
c28a6b9f382f5a23ec450303457016b2810b21fabb7304af98866c285d0af2f7
-
SHA512
47a1cbc6d4fba84957a6814b3916526f3452a44f772d000480a2424e6ca9bba869fb1c3d094a9b8006e7e0d2216e1beae18b4c08e1dad29f7006ff62b9c2baa8
-
SSDEEP
3072:uGHi6mwoNFC+Nzs57Y7cZTwqh4xEiUoF4TDwUr58ngej6:+7NLzs57Y7c1TiDUdTDun7
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://216.231.139.111/forum/viewtopic.php
-
payload_url
http://www.chandlerbacker.com/J9K.exe
http://bobinlaminasyonmakinalari.com/o9RYHbCx.exe
http://broadbentcompany.wsisrdev.com/KbGb.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2136 2260 d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe 91 PID 2260 wrote to memory of 2136 2260 d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe 91 PID 2260 wrote to memory of 2136 2260 d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1ec1a2135ea41191ac64a82bc847879_JaffaCakes118.exe"2⤵PID:2136
-